zarkones / XENA
XENA is Corss-Platform Software for Cyber-Security Automation, Adversary Simulations, and Red Team Operations. XENA strives to be fully integrated security penetration testing framework. It is equipped with a post-exploitation agent, C2 server, and a dark-themed elegant user interface.
☆277Updated this week
Related projects ⓘ
Alternatives and complementary repositories for XENA
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- AV evading OSX Backdoor and Crypter Framework☆276Updated 8 months ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆294Updated 9 months ago
- FUD metasploit Persistence RAT☆0Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆419Updated 3 weeks ago
- ☆117Updated 8 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆225Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆175Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆148Updated last year
- Command & Control-Framework created for collaboration in python3☆309Updated last year
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆213Updated 11 months ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆170Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆19Updated 11 months ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆69Updated 10 months ago
- Assist reverse tcp shells in post-exploration tasks☆214Updated 8 months ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆279Updated 3 years ago
- A nearly undetectable reverse HTTPS Botnet+RAT C2 Handler and Client written in Go☆108Updated 10 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 9 months ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆328Updated this week
- zerosum0x0's Koadic☆268Updated 2 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆358Updated last year
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆210Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- ☆134Updated last year
- C2 server to connect to a victim machine via reverse shell☆48Updated 2 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆61Updated 9 months ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆264Updated 5 months ago